CN108647963A - Determination method, apparatus, server and the storage medium of block chain main chain - Google Patents

Determination method, apparatus, server and the storage medium of block chain main chain Download PDF

Info

Publication number
CN108647963A
CN108647963A CN201810411049.4A CN201810411049A CN108647963A CN 108647963 A CN108647963 A CN 108647963A CN 201810411049 A CN201810411049 A CN 201810411049A CN 108647963 A CN108647963 A CN 108647963A
Authority
CN
China
Prior art keywords
block
chain
bifurcated
weight
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810411049.4A
Other languages
Chinese (zh)
Other versions
CN108647963B (en
Inventor
肖伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810411049.4A priority Critical patent/CN108647963B/en
Publication of CN108647963A publication Critical patent/CN108647963A/en
Priority to US16/962,713 priority patent/US20200358812A1/en
Priority to JP2020528263A priority patent/JP6964193B2/en
Priority to PCT/CN2019/072335 priority patent/WO2019210711A1/en
Application granted granted Critical
Publication of CN108647963B publication Critical patent/CN108647963B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The embodiment of the invention discloses a kind of determination method, apparatus, server and the storage medium of block chain main chain, this method includes:If detecting block chain, there are at least two bifurcated chains, it is determined that the weight of each block in each bifurcated chain;According to the weight for the block that each bifurcated chain is included, the weight of each bifurcated chain is determined;Weight according to each bifurcated chain determines main chain from bifurcated chain, and by the bifurcated chain rollback except the main chain.The embodiment of the present invention determines main chain by the weight based on bifurcated chain from bifurcated chain, it avoids to a certain extent in block generates node handoff procedure, the problem of tail portion block that previous block generates node is maliciously abandoned, increase the cost of doing evil that block generates node, reduces malicious attack success rate.

Description

Determination method, apparatus, server and the storage medium of block chain main chain
Technical field
The present embodiments relate to block chain technical field more particularly to the determination method, apparatus of block chain main chain, services Device and storage medium.
Background technology
With the continuous development of Internet technology, a kind of decentralization and open and clear block chain technology is come into being. Block chain technology has broken dependence of the current internet to central server, all data generated in network using data block It will be recorded by the node currently with issued transaction power, and by the broadcast of data and the verification of other nodes, with shape At block and it is connected to the tail portion of block chain.Each node in network is nearly all observed that each block in whole network In data, supervision of whole nodes to network data is realized, to ensure the security reliability of data in network.
Currently, each node in network can generate power to realize by common recognition mechanism to issued transaction power or block Contention.If each affairs disposal right has been arrived in contention to two nodes within the almost the same time or block generates power, this Two nodes are respectively formed block, and block data is gradually transferred to whole network.In the transmission process of two parts of block datas In, other nodes in network may first receive the data of any one block.Since the two blocks are all prolonging for main chain It stretches, therefore part node can carry out the extension of block chain on the basis of the block received, rest part node can received The extension of block chain is carried out on the basis of another block arrived, and then block chain meeting bifurcated provides two points of competitive relation Fork chain.In order to ensure the uniqueness of block chain data in network, the prior art is using the common recognition algorithm based on most long-chain, i.e., Longest bifurcated chain is considered as correct chain forever and is determined as main chain, and the block data on remaining bifurcated chain is considered as in vain.
However, the main chain based on most long-chain determines that although method is possible to bifurcated chain occur as most long-chain, it is actually The case where mistake chain.Such as malice end promotes the computing capability of this node, fights for the issued transaction power of multiple blocks, malice in advance Increase and extend to the advantageous bifurcated chain in malice end, to abandon correct bifurcated chain, realizes the malicious attack to block chain.
Invention content
An embodiment of the present invention provides a kind of determination method, apparatus, server and the storage mediums of block chain main chain, can Block chain main chain is effectively determined from bifurcated chain, reduces malicious attack success rate.
In a first aspect, an embodiment of the present invention provides a kind of determination methods of block chain main chain, including:
If detecting block chain, there are at least two bifurcated chains, it is determined that the weight of each block in each bifurcated chain;
According to the weight for the block that each bifurcated chain is included, the weight of each bifurcated chain is determined;
Weight according to each bifurcated chain determines main chain from bifurcated chain, and by the bifurcated chain rollback except the main chain.
Second aspect, an embodiment of the present invention provides a kind of determining devices of block chain main chain, including:
Block weight determination module, if there are at least two bifurcated chains for detecting block chain, it is determined that each bifurcated chain In each block weight;
Bifurcated chain weight determination module, the weight of the block for being included according to each bifurcated chain determine each bifurcated chain Weight;
Main chain determining module, for according to each bifurcated chain weight from bifurcated chain determine main chain, and by the main chain it Outer bifurcated chain rollback.
The third aspect, an embodiment of the present invention provides a kind of servers, including:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes the determination method of the block chain main chain described in any embodiment of the present invention.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage mediums, are stored thereon with computer journey Sequence realizes the determination method of the block chain main chain described in any embodiment of the present invention when the program is executed by processor.
The embodiment of the present invention is when block chain generates bifurcated chain by the way that different power is arranged for each block in bifurcated chain Weight determines main chain, and by main chain with this weight according to each bifurcated chain to obtain the weight of every bifurcated chain from bifurcated chain Except bifurcated chain rollback.The embodiment of the present invention is by being that each block in bifurcated chain is arranged according to the concrete condition of bifurcated chain Actual specific gravity of each block in block chain is carried out reasonable distribution in advance by different weights, to the power based on bifurcated chain Weight determines main chain from bifurcated chain, improves the reasonability of main chain determination.And it avoids generated in block to a certain extent In node handoff procedure, the tail portion block that previous block generates node generates asking for node malice discarding by the latter block Topic increases the cost of doing evil that the latter block generates node, reduces malicious attack success rate.
Description of the drawings
Fig. 1 is a kind of flow chart of the determination method for block chain main chain that the embodiment of the present invention one provides;
Fig. 2 is the exemplary plot for the bifurcated chain that the embodiment of the present invention one provides;
Fig. 3 is a kind of flow chart of the determination method of block chain main chain provided by Embodiment 2 of the present invention;
Fig. 4 is a kind of structural schematic diagram of the determining device for block chain main chain that the embodiment of the present invention three provides;
Fig. 5 is a kind of structural schematic diagram for server that the embodiment of the present invention four provides.
Specific implementation mode
The embodiment of the present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this The described specific embodiment in place is used only for explaining the embodiment of the present invention rather than limitation of the invention.It further needs exist for It is bright, it illustrates only for ease of description, in attached drawing and the relevant part of the embodiment of the present invention rather than entire infrastructure.
Embodiment one
Fig. 1 is a kind of flow chart of the determination method for block chain main chain that the embodiment of the present invention one provides, and the present embodiment can The case where generating bifurcated chain suitable for block chain and determining main chain, this method can be held by the determining device of block chain main chain It goes, the device can be configured in the node for having memory block chain storage permission in block catenary system.This method specifically includes as follows:
If S110, detecting block chain, there are at least two bifurcated chains, it is determined that the weight of each block in each bifurcated chain.
In the specific embodiment of the invention, the areas block Lian Zhongge block data in the block includes not only recorded in block body Transaction Information, but also include block header, such as upper block head cryptographic Hash, timestamp, that is, block generated time, work The block-identified information such as work amount difficulty and Merkle roots, that is, credible tree.Since each node in network can nearly all be observed Each area's data in the block in whole network, to realize supervision of whole nodes to network data.Therefore in block catenary system The node of permission is stored with block chain can detect whether there are bifurcated chain, if any node detects that block chain exists extremely Few two bifurcated chains then need to determine main chain from least two bifurcated chains.Specifically, can be determined as follows whether Generate bifurcated chain:If detecting, the time difference of at least twoth area timestamp in the block is less than regular hour threshold value, i.e., this is at least The generated time of two blocks is very close;If alternatively, detect that at least twoth area upper block head cryptographic Hash in the block is identical, Then being considered as in block chain has the generation of bifurcated chain.The present embodiment is not defined the detection mode of bifurcation, any to examine The detection mode for surveying block chain bifurcation can be applied in the present embodiment.Any one of the above bifurcated chain may be used Detection mode, or according to actual conditions, the detection to bifurcated chain is realized using wherein at least two kinds of combination.
Specifically, in the present embodiment, bifurcated block refers to the tail portion block of the block chain before bifurcation generates, i.e., Bifurcation is produced after bifurcated block.Correspondingly, bifurcated chain is rising using next block of bifurcated block as bifurcated chain Beginning block extends bifurcated chain.Fig. 2 is the exemplary plot of bifurcated chain, as shown in Fig. 2, bifurcation is produced after block 1, Block 1 is bifurcated block;Block 2 is the starting block of bifurcated chain (1), and current bifurcated is together constituted with block 3 thereafter Chain (1);Block 4 is the starting block of bifurcated chain (2), and current bifurcated chain (2) is together constituted with block 5 and 6 thereafter.When When the starting block of bifurcated chain is successfully incorporated in block chain i.e. bifurcation generation, different bifurcateds is followed due to different node and is risen Beginning block carries out the extension of block chain, therefore the calculation power on at least two different bifurcated chains that bifurcated comes out is that have difference , and then the growth rate of at least two bifurcated chains is also different.Over time, become, block on different bifurcated chains The things request stored is different.
Therefore, in order to ensure the uniqueness of block chain data in network, the present embodiment can when detecting bifurcation, Alternatively, being completed when block generates node in a period of time or when a certain number of transactions requests are handled and recorded, just opening Beginning is detected and judges to block information included in each bifurcated chain, and all nodes in block chain is allow to follow unification Block weight algorithm is set, according to specific weight setting rule, different weights is set for each block in bifurcated chain, with Main chain is selected according to the weight of bifurcated chain.It illustratively, can be according to incidence relation between each block in bifurcated chain and each Workload difficulty, timestamp and the affiliated block of block generate the various dimensions information such as node, the block information in bifurcated chain When meeting preset condition, such as meet certain block chain attack type, you can according to the corresponding weight setting rule of preset condition The weight of each block in each bifurcated chain is set, different weights is set as each block in bifurcated chain, rationally Significance level of each block in the bifurcated chain of place is distributed, unreasonable attack malice is avoided to extend the length of bifurcated chain.
It in the present embodiment, can be according to bifurcated for the setting for the block weight for meeting certain block chain attack type Workload difficulty, timestamp and the affiliated block of incidence relation and each block in chain between each block generate the multidimensional such as node Information is spent, a variety of block chain attack types are analyzed, according to the incidence relation between attack type and block information, with this Determine the formation condition of attack type.And detect and judge the attack belonging to bifurcated chain using this formation condition as preset condition Type, the weight to according to attack type be targetedly each block in bifurcated chain are set, that is, generate each attack class Incidence relation between type and weight setting rule.Specifically, the present embodiment can also judge according to the block information of bifurcated chain The phenomenon that block being abandoned with the presence or absence of malice.For example, malice end, which has grasped one, calculates the powerful node of power, more blocks are generated Correct block is maliciously abandoned to form and extend bifurcated chain.That is, can be originated from bifurcated by detecting in bifurcated chain Block rises, and a certain number of blocks result from node identical with the block generation node of bifurcated starting block thereafter.From And the weight that malice leaf is formed by block is set as a lower numerical value, even 0, and the production of malice end is reduced with this The weight of block in raw longer bifurcated chain.
Illustratively, as illustrated in fig. 2, it is assumed that block 1,2 and 3 is the block that a upper block generates that node A is generated, block 4, 5 and 6 generate the block that node B is generated for current block.If a certain node passes through to each block in network in block catenary system Block data is observed, and is detected that the upper block head cryptographic Hash in block 2 and 4 is identical, is then judged upper the one of block 2 and 4 Block is same block, that is, block 1, therefore, it is determined that block chain generates bifurcation.All nodes in block catenary system can abide by Unified block weight setting algorithm is followed, detects and is each area in bifurcated chain according to the block information on two bifurcated chains Different weights is arranged in block.
In the examples described above, it is assumed that node B is the node for attack that malice end is grasped, then malice end is in order to abandon The Transaction Information that node A is recorded in block 2 and 3 forms bifurcated chain (2) and is extended after block 1.Therefore in order to anti- Only directly it is confirmed as main chain since the length of bifurcated chain (2) is longer, the present embodiment is according to the block information in bifurcated chain Weight is arranged in each block.In turn, can set weight setting rule associated with the malicious attack based on most long-chain as:By two The weight setting of a bifurcated starting block is 1, if the block of block generates knot after bifurcated starting block in first bifurcated chain Point is different from the block generation node of bifurcated starting block, then can the weight of these blocks be set as 1;And by Article 2 On bifurcated chain from bifurcated originate block after block weight setting be 0 so that as honeysuckle attack block deactivate.Cause This, the incidence relation between the attack and weight setting rule of block and the subsequent area of bifurcated chain are abandoned according to this malice Block accesses situation, completes the determination to each block weight in each bifurcated chain.
The weight of S120, the block for being included according to each bifurcated chain determine the weight of each bifurcated chain.
In the specific embodiment of the invention, the weight of bifurcated chain is determined based on the weight of each block, it can be by bifurcated chain Included in the weight of each block sum to obtain the weight of the bifurcated chain, in this, as the foundation that bifurcated chain is judged, rather than The number of blocks for being included with bifurcated chain merely judges the degree of recognition of each bifurcated chain.
Illustratively, in the example of the above-mentioned malicious attack based on most long-chain, since such attack is usually happened at knot In the case of point switching, therefore the follow-up of bifurcated chain (1) is generated block by new node and is incorporated in bifurcated chain, and then bifurcated chain (1) weight is more than 1.And since malice node malice extends bifurcated chain (2), the block of block generates in bifurcated chain (2) Node is Same Vertices i.e. malice node, therefore the weight of the block in bifurcated chain (2) other than originating block is respectively provided with It is 0, and then the weight of bifurcated chain (2) is only 1.
S130, main chain is determined from bifurcated chain according to the weight of each bifurcated chain, and by the bifurcated chain rollback except main chain.
In the specific embodiment of the invention, due to carrying out the setting of weight to block, block weight is equivalent to network to this The degree of recognition of block, therefore can be determined as the maximum bifurcated chain of weight from whole bifurcated chains according to the weight of each bifurcated chain The main chain of block chain.And in order to ensure the uniqueness of block chain data in network, the institute except the bifurcated chain of main chain will be chosen as There is bifurcated chain to be considered as in vain, and Transaction Information therein restored to be considered as correct main chain to the last time.
Illustratively, in the above-mentioned malicious attack example based on most long-chain, since the weight of bifurcated chain (1) is more than 1, and The weight of bifurcated chain (2) is only 1, and the weight of bifurcated chain (1) is more than the weight of bifurcated chain (2), and then bifurcated chain (1) is determined as The main chain of block chain, and avoid that i.e. most long-chain is determined directly as main chain by the more bifurcated chain (2) of number of blocks.Due to office It is to pay very big workload that reason power or block, which generate the contention of power and the processing of Transaction Information, overcomes higher workload difficult What degree could be completed, therefore different weights is set for block, it is not being influenced normally based on the main chain method of determination of block weight In the case of the extension of block chain, is conducive to the intrusion scene for increasing malice end to block chain, reduces the success attack at malice end Rate.
It is worth noting that, the present embodiment is to there are the acts of block weight setting when attack condition in bifurcation Example, and the embodiment of the present invention can also be applied to bifurcation in non-attack type cases when bifurcated chain block weight set It is fixed.Therefore, all situations of the embodiment of the present invention suitable for bifurcation, either proper node still have aggressive Malice node, all nodes in block catenary system can follow the setting algorithm of block weight in unified bifurcated chain, work as area It can realize that the main chain based on bifurcated chain weight determines method when occurring bifurcation in block catenary system.
The technical solution of the present embodiment, when block chain generates bifurcated chain by being arranged not for each block in bifurcated chain Same weight determines main chain according to the weight of each bifurcated chain with this to obtain the weight of every bifurcated chain from bifurcated chain, and By the bifurcated chain rollback except main chain.The embodiment of the present invention is by being each area in bifurcated chain according to the concrete condition of bifurcated chain Different weights is arranged in block, and actual specific gravity of each block in block chain is carried out reasonable distribution in advance, to be based on bifurcated The weight of chain determines main chain from bifurcated chain, improves the reasonability of main chain determination.And it is avoided to a certain extent in area Block generates in node handoff procedure, and the tail portion block that previous block generates node generates node malice discarding by the latter block The problem of, increase the cost of doing evil that the latter block generates node, reduces malicious attack success rate.
Embodiment two
On the basis of the above embodiment 1, provide the determination method of block chain main chain one is preferred real for the present embodiment Mode is applied, corresponding weight setting can be carried out according to attack type.Fig. 3 is a kind of block chain provided by Embodiment 2 of the present invention The flow chart of the determination method of main chain, as shown in figure 3, this method includes step in detail below:
If S310, detecting block chain, there are at least two bifurcated chains, true according to the block information for including in each bifurcated chain Set the goal attack type.
In the specific embodiment of the invention, since the attack purpose at malice end is that the Transaction Information for making oneself illegal becomes Effectively therefrom to make a profit, therefore common attack type largely belongs to the attacker that method is determined based on the main chain of most long-chain Formula, such as honeysuckle attack.So that the illegal bifurcated chain elongation in malice end is most long-chain, to abandon correct area in block chain Block.It can be according to workload difficulty, timestamp and the affiliated area of incidence relation and each block between each block in bifurcated chain Block generates the various dimensions information such as node, analyzes a variety of block chain attack types, according to attack type and block information it Between incidence relation, the formation condition of attack type is determined with this.
In the present embodiment since each node in network is nearly all observed that in whole network in each block Data, to realize supervision of whole nodes to network data.Therefore the knot with block chain storage permission in block catenary system Point can detect whether there are bifurcated chain, if any node detects block chain there are at least two bifurcated chains, need from Main chain is determined at least two bifurcated chains.Bifurcated chain whether is generated specifically, can be determined as follows:If detect to The time difference of the areas Shao Liangge timestamp in the block is less than regular hour threshold value, the i.e. generated time of at least two block very It is close;If alternatively, detecting that at least twoth area upper block head cryptographic Hash in the block is identical, being considered as in block chain has bifurcated chain It generates.The detection mode of any one of the above bifurcated chain may be used, or according to actual conditions, using wherein at least two kinds In conjunction with realizing the detection to bifurcated chain.And then when detecting bifurcation, alternatively, being completed to one section when block generates node In time or when a certain number of transactions requests are handled and recorded, begin to block information included in each bifurcated chain It is detected and judges, according to the incidence relation between each block in the formation condition and bifurcated chain of each attack type, each area The workload difficulty of block, timestamp and affiliated block generate the various dimensions information such as node, determine that bifurcated chain is current suffered Target attack type.
Illustratively, honeysuckle attack can also be referred to as dual payment attack, as the term suggests it is exactly that malice end is used only one Money can be completed to be spent twice, or the money spent out is taken back.It is specifically referred in bit coin transfers accounts scene, When the first stroke transfer transaction data that main chain carries out is identified to form block, malice end, can be most in order to make this transaction invalid Continuous several times issued transaction power is won in short time and carries out the second transaction, with a upper block for block of merchandising from the first stroke Start to generate bifurcated, and the corresponding bifurcated of the first transaction, which is supported length, using the block got ready in advance makes it become main chain, to Make the first stroke money transfer transactions invalid.Therefore, the formation condition of honeysuckle attack can be:In bit coin transfers accounts scene, work as generation When two bifurcated chains, if the block generation node of bifurcated starting block is identical in every bifurcated chain, and on a wherein bifurcated chain It is that above-mentioned block generates node to generate node also from the block of block after bifurcated starting block, can determine that honeysuckle is attacked at this time For the target attack type of bifurcated chain.
S320, according to the incidence relation between preset attack type and weight setting rule, determine target attack type Associated target weight setting rule.
In the specific embodiment of the invention, detects and judged belonging to bifurcated chain according to the formation condition of each attack type Attack type, the weight to according to attack type be targetedly each block in bifurcated chain are set, that is, generate and respectively attack The incidence relation between type and weight setting rule is hit, to inhibit or prevent the attack at malice end, increases attacking for malice end Cost is hit, the success rate of attack is reduced.
Illustratively, the formation condition according to honeysuckle attack and its harm brought, can set and attack phase with honeysuckle Associated weight setting rule is:If the block of either block generates the area of node and a upper block for the block in bifurcated chain Block generates node and differs, then the weight that the block is arranged is 1;If the block of the block generates node and mono- areas block Shang The block generation node of block is identical, and a upper block for the block is bifurcated block, then the weight of the block is set as 1;If The block generation node and the block generation node of a upper block for the block of the block are identical, and a upper block for the block is not For bifurcated block, then the weight of the block is set as 0.
S330, the weight that each block in bifurcated chain is determined according to target weight setting rule.
In the specific embodiment of the invention, according to target weight setting rule, to meet target weight setting in bifurcated chain The corresponding weight of each Block Set of rule.
Preferably, the attack pattern of block is maliciously abandoned for being mostly based on most long-chain, following weight can be carried out General setting:If the block of any current block generates the block of node and a upper block for the current block in bifurcated chain It generates node to differ, then the weight that the current block is arranged is the first numerical value;If the block of the current block generate node with The block generation node of a upper block for the current block is identical, and a upper block is bifurcated block, then by the current block Weight is set as the first numerical value;If the block that the block of the current block generates node and a upper block for the current block generates Node is identical, and a upper block is not bifurcated block, then sets the weight of the current block to second value;Wherein, first Numerical value is more than second value.
In the present embodiment, it is to be understood that by the identification of above-mentioned attack type, according to the block letter in bifurcated chain Breath, is arranged larger weight by the correct block in bifurcated chain, smaller weight is arranged in wrong block in bifurcated chain, by right Different weights is arranged in block in bifurcated chain, comes effectively to reduce the degree of recognition for even being eliminated malice block with this, to invalid Fall the extended bifurcated chain of malice end malice, protects the correct block in block chain.
The weight of S340, the block for being included according to each bifurcated chain, the weight of each block included in bifurcated chain is asked With obtain the weight of bifurcated chain.
In the specific embodiment of the invention, the weight of bifurcated chain is determined based on the weight of each block, it can be by bifurcated chain Included in the weight of each block sum to obtain the weight of the bifurcated chain, in this, as the foundation that bifurcated chain is judged, rather than The number of blocks for being included with bifurcated chain merely judges the degree of recognition of each bifurcated chain.
S350, determine that the maximum bifurcated chain of weight as main chain, and will be led from bifurcated chain according to the weight of each bifurcated chain Bifurcated chain rollback except chain.
In the specific embodiment of the invention, due to carrying out the setting of weight to block, block weight is equivalent to network to this The degree of recognition of block, therefore can be determined as the maximum bifurcated chain of weight from whole bifurcated chains according to the weight of each bifurcated chain The main chain of block chain.And in order to ensure the uniqueness of block chain data in network, the institute except the bifurcated chain of main chain will be chosen as There is bifurcated chain to be considered as in vain, and Transaction Information therein restored to be considered as correct main chain to the last time.
The technical solution of the present embodiment is completed when block chain generates bifurcated chain, or when block generates node to one section In time or when a certain number of transactions requests are handled and recorded, pass through the knowledge to bifurcated chain said target attack type Not, the target weight setting rule associated by target attack type is determined, to be bifurcated chain according to target weight setting rule In each block different weights is set.Or using general weight setting rule, to be identified as disliking based on most long-chain Meaning abandons the setting of the corresponding bifurcated chain progress block weight of attack pattern of block.To obtain the weight of every bifurcated chain, Maximum bifurcated chain of weight is determined as main chain with this, and by the item data rollback in the bifurcated chain except main chain.The present invention Embodiment is that each block in bifurcated chain corresponds to by the determination to the affiliated attack type of bifurcated chain and weight setting rule The setting of weight reduces the degree of recognition for even being eliminated illegal block with this, to by malice end specially extended bifurcated chain without Effect is fallen, and the correct block in block chain is protected, and main chain can be determined from bifurcated chain based on the weight of bifurcated chain, in certain journey It is avoided on degree in block generates node handoff procedure, the tail portion block that previous block generates node is given birth to by the latter block The problem of being abandoned at node malice increases the cost of doing evil that the latter block generates node, reduces malicious attack success rate.
Embodiment three
Fig. 4 is a kind of structural schematic diagram of the determining device for block chain main chain that the embodiment of the present invention three provides, this implementation Example is applicable to the case where generating bifurcated chain in block chain and determine main chain, which can realize described in any embodiment of the present invention Block chain main chain determination method.The device specifically includes:
Block weight determination module 410, if there are at least two bifurcated chains for detecting block chain, it is determined that each bifurcated The weight of each block in chain;
Bifurcated chain weight determination module 420, the weight of the block for being included according to each bifurcated chain determine each bifurcated chain Weight;
Main chain determining module 430 determines main chain for the weight according to each bifurcated chain from bifurcated chain, and by the main chain Except bifurcated chain rollback.
Further, the block weight determination module 410, including:
Attack type determination unit, for determining target attack type according to the block information for including in each bifurcated chain;
Weight rule determination unit is used for according to the incidence relation between preset attack type and weight setting rule, Determine the target weight setting rule associated by the target attack type;
Block weight determining unit determines each block in the bifurcated chain for setting rule according to the target weight Weight.
Preferably, then the block weight determination module 410, is specifically additionally operable to:
If the block of any current block generates node and a upper block for the current block in the bifurcated chain Block generates node and differs, then the weight that the current block is arranged is the first numerical value;
If the block that the block of the current block generates node and a upper block for the current block generates node phase Together, and a upper block is bifurcated block, then sets the weight of the current block to first numerical value;
If the block that the block of the current block generates node and a upper block for the current block generates node phase Together, and a upper block is not bifurcated block, then sets the weight of the current block to second value;
Wherein, first numerical value is more than the second value.
Preferably, the bifurcated chain weight determination module 420, is specifically used for:
The weight of each block included in the bifurcated chain is summed to obtain the weight of the bifurcated chain.
Preferably, the main chain determining module 430 is specifically used for:
Determine the maximum bifurcated chain of weight as main chain.
The technical solution of the present embodiment is realized the detection of bifurcated chain, is attacked by the mutual cooperation between each function module Hit the determination of type, being associated with of attack type and weight setting rule, the setting of block weight, the determination of bifurcated chain weight and The functions such as the determination of main chain.The embodiment of the present invention is by being that each block in bifurcated chain is arranged according to the concrete condition of bifurcated chain Actual specific gravity of each block in block chain is carried out reasonable distribution in advance by different weights, to the power based on bifurcated chain Weight determines main chain from bifurcated chain, improves the reasonability of main chain determination.And it avoids generated in block to a certain extent In node handoff procedure, the tail portion block that previous block generates node generates asking for node malice discarding by the latter block Topic increases the cost of doing evil that the latter block generates node, reduces malicious attack success rate.
Example IV
Fig. 5 is a kind of structural schematic diagram for server that the embodiment of the present invention four provides, and Fig. 5 is shown suitable for being used for realizing The block diagram of the exemplary servers of embodiment of the embodiment of the present invention.The server that Fig. 5 is shown is only an example, should not be right The function and use scope of the embodiment of the present invention bring any restrictions.
The server 12 that Fig. 5 is shown is only an example, should not be to the function and use scope band of the embodiment of the present invention Carry out any restrictions.
As shown in figure 5, server 12 is showed in the form of universal computing device.The component of server 12 may include but not It is limited to:One or more processor or processing unit 16, system storage 28, connection different system component (including system Memory 28 and processing unit 16) bus 18.
Bus 18 indicates one or more in a few class bus structures, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts For example, these architectures include but not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 12 typically comprises a variety of computer system readable media.These media can any can be serviced The usable medium that device 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (RAM) 30 and/or cache memory 32.Server 12 may further include other removable/nonremovable , volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing not removable Dynamic, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although being not shown in Fig. 5, can provide For the disc driver to moving non-volatile magnetic disk (such as " floppy disk ") read-write, and to moving anonvolatile optical disk The CD drive of (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver can To be connected with bus 18 by one or more data media interfaces.Memory 28 may include at least one program product, There is the program product one group of (for example, at least one) program module, these program modules to be configured to perform each implementation of the invention The function of example.
Program/utility 40 with one group of (at least one) program module 42 can be stored in such as memory 28 In, such program module 42 include but not limited to operating system, one or more application program, other program modules and Program data may include the realization of network environment in each or certain combination in these examples.Program module 42 is usual Execute the function and/or method in described embodiment of the embodiment of the present invention.
Server 12 can also be logical with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 etc.) Letter, can also be enabled a user to one or more equipment interact with the server 12 communicate, and/or with make the server 12 any equipment (such as network interface card, modem etc.) communications that can be communicated with one or more of the other computing device. This communication can be carried out by input/output (I/O) interface 22.Also, server 12 can also pass through network adapter 20 With one or more network (such as LAN (LAN), wide area network (WAN) and/or public network, such as internet) communication. As shown, network adapter 20 is communicated by bus 18 with other modules of server 12.It should be understood that although not showing in figure Go out, other hardware and/or software module can be used in conjunction with server 12, including but not limited to:Microcode, device driver, Redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 is stored in program in system storage 28 by operation, to perform various functions application and Data processing, such as realize the determination method for the block chain main chain that the embodiment of the present invention is provided.
Embodiment five
The embodiment of the present invention five also provides a kind of computer readable storage medium, be stored thereon with computer program (or For computer executable instructions), for executing a kind of determination method of block chain main chain, the party when which is executed by processor Method includes:
If detecting block chain, there are at least two bifurcated chains, it is determined that the weight of each block in each bifurcated chain;
According to the weight for the block that each bifurcated chain is included, the weight of each bifurcated chain is determined;
Weight according to each bifurcated chain determines main chain from bifurcated chain, and by the bifurcated chain rollback except the main chain.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present invention Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or the arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:Tool There are one or the electrical connection of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium, which can be any, includes or the tangible medium of storage program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming languages or combinations thereof come write for execute the embodiment of the present invention operation Computer program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, further include conventional procedural programming language-such as " C " language or similar program design language Speech.Program code can be executed fully, partly be executed on the user computer, as an independence on the user computer Software package execute, part on the user computer part execute on the remote computer or completely in remote computer or It is executed on server.In situations involving remote computers, remote computer can pass through the network of any kind --- packet It includes LAN (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as profit It is connected by internet with ISP).
Note that above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The present invention is not limited to specific embodiments described here, can carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being implemented to the present invention by above example Example is described in further detail, but the embodiment of the present invention is not limited only to above example, is not departing from structure of the present invention Can also include other more equivalent embodiments in the case of think of, and the scope of the present invention is determined by scope of the appended claims It is fixed.

Claims (12)

1. a kind of determination method of block chain main chain, which is characterized in that including:
If detecting block chain, there are at least two bifurcated chains, it is determined that the weight of each block in each bifurcated chain;
According to the weight for the block that each bifurcated chain is included, the weight of each bifurcated chain is determined;
Weight according to each bifurcated chain determines main chain from bifurcated chain, and by the bifurcated chain rollback except the main chain.
2. according to the method described in claim 1, it is characterized in that, in each bifurcated chain of the determination each block weight, including:
Target attack type is determined according to the block information for including in each bifurcated chain;
According to the incidence relation between preset attack type and weight setting rule, determine associated by the target attack type Target weight setting rule;
The weight that rule determines each block in the bifurcated chain is set according to the target weight.
3. according to the method described in claim 1, it is characterized in that, in each bifurcated chain of the determination each block weight, including:
If the block of any current block generates the block of node and a upper block for the current block in the bifurcated chain It generates node to differ, then the weight that the current block is arranged is the first numerical value;
If it is identical as the block of a upper block for the current block generation node that the block of the current block generates node, and A upper block is bifurcated block, then sets the weight of the current block to first numerical value;
If it is identical as the block of a upper block for the current block generation node that the block of the current block generates node, and A upper block is not bifurcated block, then sets the weight of the current block to second value;
Wherein, first numerical value is more than the second value.
4. according to the method described in claim 1, it is characterized in that, the weight of the block for being included according to each bifurcated chain, Determine the weight of each bifurcated chain, including:
The weight of each block included in the bifurcated chain is summed to obtain the weight of the bifurcated chain.
5. according to the method described in claim 1, it is characterized in that, the weight according to each bifurcated chain determines master from bifurcated chain Chain, including:
Determine the maximum bifurcated chain of weight as main chain.
6. a kind of determining device of block chain main chain, which is characterized in that including:
Block weight determination module, if there are at least two bifurcated chains for detecting block chain, it is determined that each in each bifurcated chain The weight of block;
Bifurcated chain weight determination module, the weight of the block for being included according to each bifurcated chain determine the weight of each bifurcated chain;
Main chain determining module determines main chain for the weight according to each bifurcated chain from bifurcated chain, and will be except the main chain Bifurcated chain rollback.
7. device according to claim 6, which is characterized in that the block weight determination module, including:
Attack type determination unit, for determining target attack type according to the block information for including in each bifurcated chain;
Weight rule determination unit, for according to the incidence relation between preset attack type and weight setting rule, determining Target weight setting rule associated by the target attack type;
Block weight determining unit, for setting the power that rule determines each block in the bifurcated chain according to the target weight Weight.
8. device according to claim 6, which is characterized in that the block weight determination module is specifically additionally operable to:
If the block of any current block generates the block of node and a upper block for the current block in the bifurcated chain It generates node to differ, then the weight that the current block is arranged is the first numerical value;
If it is identical as the block of a upper block for the current block generation node that the block of the current block generates node, and A upper block is bifurcated block, then sets the weight of the current block to first numerical value;
If it is identical as the block of a upper block for the current block generation node that the block of the current block generates node, and A upper block is not bifurcated block, then sets the weight of the current block to second value;
Wherein, first numerical value is more than the second value.
9. device according to claim 6, which is characterized in that the bifurcated chain weight determination module is specifically used for:
The weight of each block included in the bifurcated chain is summed to obtain the weight of the bifurcated chain.
10. device according to claim 6, which is characterized in that the main chain determining module is specifically used for:
Determine the maximum bifurcated chain of weight as main chain.
11. a kind of server, which is characterized in that including:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now determination method of the block chain main chain as described in any one of claim 1 to 5.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The determination method of the block chain main chain as described in any one of claim 1 to 5 is realized when execution.
CN201810411049.4A 2018-05-02 2018-05-02 Method and device for determining main chain of block chain, server and storage medium Active CN108647963B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201810411049.4A CN108647963B (en) 2018-05-02 2018-05-02 Method and device for determining main chain of block chain, server and storage medium
US16/962,713 US20200358812A1 (en) 2018-05-02 2019-01-18 Method for determining main chain of blockchain, device, and storage medium
JP2020528263A JP6964193B2 (en) 2018-05-02 2019-01-18 How to determine the main chain of the blockchain, devices, equipment and storage media
PCT/CN2019/072335 WO2019210711A1 (en) 2018-05-02 2019-01-18 Method and apparatus for determining main chain of blockchain, device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810411049.4A CN108647963B (en) 2018-05-02 2018-05-02 Method and device for determining main chain of block chain, server and storage medium

Publications (2)

Publication Number Publication Date
CN108647963A true CN108647963A (en) 2018-10-12
CN108647963B CN108647963B (en) 2020-05-12

Family

ID=63749032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810411049.4A Active CN108647963B (en) 2018-05-02 2018-05-02 Method and device for determining main chain of block chain, server and storage medium

Country Status (4)

Country Link
US (1) US20200358812A1 (en)
JP (1) JP6964193B2 (en)
CN (1) CN108647963B (en)
WO (1) WO2019210711A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858285A (en) * 2018-12-07 2019-06-07 上海异势信息科技有限公司 Processing method, device, equipment and the medium of block chain data
WO2019210711A1 (en) * 2018-05-02 2019-11-07 百度在线网络技术(北京)有限公司 Method and apparatus for determining main chain of blockchain, device, and storage medium
CN110689345A (en) * 2019-09-06 2020-01-14 北京清红微谷技术开发有限责任公司 Unlicensed blockchain consensus method and system for adjusting block weights, and P2P network
CN110704464A (en) * 2019-09-12 2020-01-17 广州蚁比特区块链科技有限公司 Method and device for processing bifurcation problem
CN111445247A (en) * 2020-04-09 2020-07-24 堡垒科技有限公司 Method and apparatus for preventing block chain forking
CN111641666A (en) * 2019-03-01 2020-09-08 湖南天河国云科技有限公司 Main chain selection method and device and computer readable storage medium
CN111724164A (en) * 2020-06-19 2020-09-29 中国联合网络通信集团有限公司 Method and device for preventing replay attack
CN111737358A (en) * 2020-07-20 2020-10-02 百度在线网络技术(北京)有限公司 Method, device and equipment for determining main chain of block chain and storage medium
WO2022033488A1 (en) * 2020-08-10 2022-02-17 杭州复杂美科技有限公司 Block processing method, device, and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3449452B1 (en) 2016-04-29 2022-06-29 Nchain Holdings Limited Implementing logic gate functionality using a blockchain
GB201607477D0 (en) * 2016-04-29 2016-06-15 Eitc Holdings Ltd A method and system for controlling the performance of a contract using a distributed hash table and a peer to peer distributed ledger
US11108820B2 (en) * 2019-06-16 2021-08-31 Moac Blockchain Tech Inc Apparatus and method for distinguishing between legitimate and malicious branches of a split blockchain
CN111339086B (en) * 2020-02-18 2021-04-20 腾讯科技(深圳)有限公司 Block processing method, and data query method and device based on block chain
CN113269637A (en) * 2020-12-28 2021-08-17 上海能链众合科技有限公司 Intelligent device data evidence storing and verifying method based on block chain
CN113094396B (en) * 2021-01-18 2022-07-26 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium based on node memory

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106530088A (en) * 2016-12-19 2017-03-22 杜伯仁 Method for trading stock product based on block chain security nodes
CN107507006A (en) * 2017-08-11 2017-12-22 杭州秘猿科技有限公司 A kind of common recognition bifurcated processing method based on license chain
US20180089683A1 (en) * 2016-09-29 2018-03-29 Microsoft Technology Licensing, Llc. Heartbeats and consensus in verifiable outsourced ledgers

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9875510B1 (en) * 2015-02-03 2018-01-23 Lance Kasper Consensus system for tracking peer-to-peer digital records
US10304143B2 (en) * 2016-05-05 2019-05-28 Lance Timothy Kasper Consensus system for manipulation resistant digital record keeping
JP6355168B2 (en) * 2015-11-09 2018-07-11 日本電信電話株式会社 Block chain generation device, block chain generation method, block chain verification device, block chain verification method and program
US20180114218A1 (en) * 2016-10-26 2018-04-26 International Business Machines Corporation Blockchain: automatic fork protection
US10764325B2 (en) * 2018-03-30 2020-09-01 Konica Minolta Laboratory U.S.A., Inc. Method for adjusting mining difficulty of a cryptocurrency blockchain system by monitoring malicious forks and implementing a miners blockchain
CN108647963B (en) * 2018-05-02 2020-05-12 百度在线网络技术(北京)有限公司 Method and device for determining main chain of block chain, server and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
US20180089683A1 (en) * 2016-09-29 2018-03-29 Microsoft Technology Licensing, Llc. Heartbeats and consensus in verifiable outsourced ledgers
CN106530088A (en) * 2016-12-19 2017-03-22 杜伯仁 Method for trading stock product based on block chain security nodes
CN107507006A (en) * 2017-08-11 2017-12-22 杭州秘猿科技有限公司 A kind of common recognition bifurcated processing method based on license chain

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019210711A1 (en) * 2018-05-02 2019-11-07 百度在线网络技术(北京)有限公司 Method and apparatus for determining main chain of blockchain, device, and storage medium
CN109858285A (en) * 2018-12-07 2019-06-07 上海异势信息科技有限公司 Processing method, device, equipment and the medium of block chain data
CN109858285B (en) * 2018-12-07 2023-03-14 上海异势信息科技有限公司 Block chain data processing method, device, equipment and medium
CN111641666A (en) * 2019-03-01 2020-09-08 湖南天河国云科技有限公司 Main chain selection method and device and computer readable storage medium
CN111641666B (en) * 2019-03-01 2023-04-07 湖南天河国云科技有限公司 Main chain selection method and device and computer readable storage medium
CN110689345B (en) * 2019-09-06 2022-03-18 北京清红微谷技术开发有限责任公司 Unlicensed blockchain consensus method and system for adjusting block weights, and P2P network
CN110689345A (en) * 2019-09-06 2020-01-14 北京清红微谷技术开发有限责任公司 Unlicensed blockchain consensus method and system for adjusting block weights, and P2P network
CN110704464A (en) * 2019-09-12 2020-01-17 广州蚁比特区块链科技有限公司 Method and device for processing bifurcation problem
CN110704464B (en) * 2019-09-12 2022-07-08 广州蚁比特区块链科技有限公司 Method and device for processing bifurcation problem
CN111445247A (en) * 2020-04-09 2020-07-24 堡垒科技有限公司 Method and apparatus for preventing block chain forking
CN111445247B (en) * 2020-04-09 2021-05-28 堡垒科技有限公司 Method and apparatus for preventing block chain forking
CN111724164A (en) * 2020-06-19 2020-09-29 中国联合网络通信集团有限公司 Method and device for preventing replay attack
CN111724164B (en) * 2020-06-19 2023-07-14 中国联合网络通信集团有限公司 Method and device for preventing replay attack
CN111737358B (en) * 2020-07-20 2020-12-22 百度在线网络技术(北京)有限公司 Method, device and equipment for determining main chain of block chain and storage medium
CN111737358A (en) * 2020-07-20 2020-10-02 百度在线网络技术(北京)有限公司 Method, device and equipment for determining main chain of block chain and storage medium
WO2022033488A1 (en) * 2020-08-10 2022-02-17 杭州复杂美科技有限公司 Block processing method, device, and storage medium

Also Published As

Publication number Publication date
WO2019210711A1 (en) 2019-11-07
JP6964193B2 (en) 2021-11-10
CN108647963B (en) 2020-05-12
JP2021504808A (en) 2021-02-15
US20200358812A1 (en) 2020-11-12

Similar Documents

Publication Publication Date Title
CN108647963A (en) Determination method, apparatus, server and the storage medium of block chain main chain
CN108984645B (en) Block chain processing method, device, equipment and storage medium
CN109242685B (en) Block chain-based consensus and verification method and device
CN109075964B (en) Block chaining supporting multiple one-way functions for block verification
CN109118230B (en) Information processing method and device based on block chain
CN109255057A (en) Block generation method, device, equipment and storage medium
US20190379546A1 (en) Method for reaching consensus on public distributed ledgers and system using the same
CN110601819B (en) Processing method for random number, block chain link point device and storage medium
CN112116334A (en) Cross-block-chain third-party arbitration performance guarantee system and method thereof
WO2020213763A1 (en) Method and system for verifying block-chain data stored in storage having different format from block-chain
WO2019050553A2 (en) Selection of digital properties for transactions
CN111325546A (en) Block chain transaction system and method based on hardware wallet
CN109905366A (en) Terminal device safe verification method, device, readable storage medium storing program for executing and terminal device
KR20210033846A (en) Blockchain transaction method with reduced transaction size using cryptographic hash algorithm
CN109685507A (en) The identification of transactions requests validity and initiating method, device, equipment and medium
CN110648235A (en) Cross-chain asset transfer method based on trusted computing environment (TEE)
CN109670956A (en) Block chain method of commerce and device
KR20200084177A (en) Transaction processing system and method enabling extension of block chain
CN115328621A (en) Transaction processing method, device and equipment based on block chain and storage medium
CN109919767B (en) Transaction risk management method, device and equipment
JP2022541834A (en) Intelligent contract execution method and apparatus
CN111756749A (en) Secure access method, device, equipment and storage medium
CN116341023B (en) Block chain-based service address verification method, device, equipment and storage medium
CN105871834B (en) A kind of method and apparatus calculating malice index
TW202032454A (en) Risk identification-based account transfer request processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant